Mutt < 1.4.1 / 1.5 Address Handling Buffer Overflow Vulnerability

medium Nessus Network Monitor Plugin ID 1297

Synopsis

The remote host is vulnerable to a buffer overflow

Description

The remote host is running a version of the Mutt email client that contains a buffer overflow in the email address handling routines. Exploitation of this overflow by an attacker may allow arbitrary code execution in the context of the Mutt user.

Solution

Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org

Plugin Details

Severity: Medium

ID: 1297

Family: SMTP Clients

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mutt:mutt

Reference Information

CVE: CVE-2002-0001

BID: 3774